Collaborative Information Service - Privacy Algebra for User Defined Security

Asim K. Pal, Subrata Bose, Arpita Maitra

Abstract

With the increased activity over the internet and globalization of the market economy collaborative computing becomes an important area of research. Security is an increasing concern because of chances of malicious elements breaching the network of collaborating partners. Further the level of mutual belief among the collaborators would not be identical and may change with experience. Thus the concept of user defined flexible security requirements arose. The idea of user defined privacy template was brought in IRaaS (Information Retrieval as a Service) (Pal and Bose 2013) which is a flexible system of information services to customers who seek information from various sources through a service provider. The idea was further extended to CIS (Collaborative Information Service) (Pal and Bose 2016) which provides a framework for general information exchange activities (not restricted to retrievals only) for a set of collaborating partners. The current work extends CIS by introducing privacy algebra to be applied on templates to get a concise expression of privacy restrictions. CIS is a step towards a privacy aware collaborative computing problem.

References

  1. Agrawal, R., Evfimievski, A. and Srikant, R. (2003). Information sharing across private databases. Proceedings of the 2003 ACM SIGMOD international conference on Management of data.
  2. Ahmed, T. and Tripathi, A. (2007). Specification and verification of security requirements in a programming model for decentralized CSCW systems. ACM Transactions on Information and System Security (TISSEC) 10.2 (2007): 7.
  3. Karnouskos, S., Colombo, A., Bangemann, T., Manninen, K., Camp, R., Tilly, M., Stluka, P., Jammes, F., Delsing, J. and Eliasson, J. (2012). A SOA-based architecture for empowering future collaborative cloud-based industrial automation. IECON 2012 - 38th Annual Conference on IEEE Industrial Electronics Society.
  4. Olumofin, F. and Goldberg, I. (2010). Privacy-preserving queries over relational databases. Proceedings of the 10th international conference on Privacy enhancing technologies. Springer Berlin Heidelberg, 2010.
  5. Pal, A. and Bose, S. (2013). Information Retrieval as a Service for Multiple Heterogeneous Data-Privacy Model. Proceedings of the Third International Conference on Parallel, Distributed, Grid and Cloud Computing for Engineering, Stirlingshire, Paper 31.
  6. Pearson, S., Shen, Y. and Mowbray, M. (2009). A Privacy Manager for Cloud Computing. Lecture Notes in Computer Science, Cloud Computing. Springer, 2009, pp.90-106.
  7. Zhang, X., Nakae, M., Covington, M. J., & Sandhu, R. (2006, June). A usage-based authorization framework for collaborative computing systems. In Proceedings of the eleventh ACM symposium on Access control models and technologies (pp. 180-189). ACM.
  8. Reardon, J., Pound, J. and Goldberg, I. (2007). Relationalcomplete private information retrieval. University of Waterloo, Tech. Rep. CACR 34 (2007).
  9. Shiyuan, W., Agrawal, D. and Abbadi, A. (2011). Towards practical private processing of database queries over public data with homomorphic encryption, Technical Report 2011-06, Univ. California at Santa Barbara, 2011.
  10. Shiyuan, W., Agrawal, D. and Abbadi, A. (2012). Is homomorphic encryption the holy grail for database queries on encrypted data. Technical report, Department of Computer Science, UCSB, 2012.
  11. Gentry, C. (2009) A fully homomorphic encryption scheme, Diss. Stanford University, 2009.
  12. Pal, A. and Bose, S. (2015). Information Retrieval as a Service - IRaaS: A Concept Paper on Privacy Analysis, WPS 763, Indian Institute Management Calcutta, June 2015. https://facultylive.iimcal.ac.in/ sites/facultylive.iimcal.ac.in/files/WPS%20763.pdf.
  13. Pal, A. and Dey, S. (2014). A Policy-based Security Framework for Storage and Computation on Enterprise Data in the Cloud, Proc. 47th Hawaii International Conference on System Sciences 2014 (HICSS), 6-9 January 2014, Hawaii. IEEE.
  14. Pal, A. and Bose, S. (2016). Collaborative Information Service: The Security Question, Proc. 49th Hawaii International Conference on System Sciences 2016 (HICSS), January 2016, Hawaii. IEEE (to be appeared).
  15. Atallah, M. (2006). Security issues in collaborative computing." Lecture Notes in Computer Science 4112 (2006): 2.
  16. Zhu, M., Shen, J., Yan, S., & Zhao, B. (2006). U.S. Patent No. 7,069,298. Washington, DC: U.S. Patent and Trademark Office.
Download


Paper Citation


in Harvard Style

Pal A., Bose S. and Maitra A. (2016). Collaborative Information Service - Privacy Algebra for User Defined Security . In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-167-0, pages 473-481. DOI: 10.5220/0005746304730481


in Bibtex Style

@conference{icissp16,
author={Asim K. Pal and Subrata Bose and Arpita Maitra},
title={Collaborative Information Service - Privacy Algebra for User Defined Security},
booktitle={Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2016},
pages={473-481},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005746304730481},
isbn={978-989-758-167-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Collaborative Information Service - Privacy Algebra for User Defined Security
SN - 978-989-758-167-0
AU - Pal A.
AU - Bose S.
AU - Maitra A.
PY - 2016
SP - 473
EP - 481
DO - 10.5220/0005746304730481